浏览全部资源
扫码关注微信
[ "薄明霞(1978- ),女,博士,中国电信股份有限公司研究院高级工程师,主要研究方向为威胁情报、态势感知、云网融合安全等" ]
[ "唐洪玉(1977- ),男,中国电信股份有限公司研究院运营支撑部主任,主要研究方向为云安全、威胁检测、态势感知" ]
[ "马晨(1993- ),男,中国电信股份有限公司研究院工程师,主要研究方向为云安全、威胁检测、态势感知" ]
[ "张鉴(1976- ),男,中国电信股份有限公司研究院高级工程师,主要研究方向为云安全、安全攻防、5G安全" ]
网络出版日期:2020-11,
纸质出版日期:2020-11-20
移动端阅览
薄明霞, 唐洪玉, 马晨, 等. 基于大数据分析的安全威胁情报在电信运营商的落地应用[J]. 电信科学, 2020,36(11):127-133.
Mingxia BO, Hongyu TANG, Chen MA, et al. Application of security threat intelligence based on big data analysis in telecom operators[J]. Telecommunications science, 2020, 36(11): 127-133.
薄明霞, 唐洪玉, 马晨, 等. 基于大数据分析的安全威胁情报在电信运营商的落地应用[J]. 电信科学, 2020,36(11):127-133. DOI: 10.11959/j.issn.1000-0801.2020301.
Mingxia BO, Hongyu TANG, Chen MA, et al. Application of security threat intelligence based on big data analysis in telecom operators[J]. Telecommunications science, 2020, 36(11): 127-133. DOI: 10.11959/j.issn.1000-0801.2020301.
威胁情报作为运营商应对新的攻击手段和变化多端的安全威胁的利器,也是将传统的被动防御转为主动防御的核心动力。介绍了威胁情报对于运营商的重要性,详细分析了威胁情报的生产流程,最后给出威胁情报的典型应用场景,可为电信运营商威胁情报的落地实践提供技术参考。
As a powerful tool for operators to deal with means of new attack and ever-changing security threats
threat intelligence is also the core power to transform traditional passive defense into active defense.The importance of threat intelligence to operators was introduced
the productive process of threat intelligence was analyzed in detail
and finally the typical application scenarios of threat intelligence were given
which could provide technical reference for telecom operators in the practice of threat intelligence.
陈曦 , 冯梅 , 李青 . 当前网络威胁情报分类和实用性研究 [J ] . 信息系统工程 , 2019 ( 4 ).
CHEN X , FENG M , LI Q . Classification and practical research of current Cyber threat intelligence [J ] . China CIO News , 2019 ( 4 ).
兰昆 , 喻显茂 , 唐林 . 威胁驱动的网络安全防护模型及应用研究 [J ] . 电力信息与通信技术 , 2020 , 18 ( 10 ): 20 - 27 .
LAN K , YU X M , TANG L . Research on threat-driven cyber security protection model and its application [J ] . Electric Power Information and Communication Technology , 2020 , 18 ( 10 ): 20 - 27 .
陶昱玮 . 网络威胁情报活动模型建构与解析 [J ] . 保密科学技术 , 2017 ( 8 ): 21 - 28 .
TAO Y W . Modeling and analysis of cyber threat intelligence activities [J ] . Secrecy Science and Technology , 2017 ( 8 ): 21 - 28 .
荣晓燕 , 宋丹娃 . 基于大数据和威胁情报的网络攻击防御体系研究 [J ] . 信息安全研究 , 2019 , 5 ( 5 ): 25 - 29 .
RONG X Y , SONG D W . Research on cyber gattack defensesystem based on big data and threat intelligence [J ] . Journal of Information Securyity Research , 2019 , 5 ( 5 ): 25 - 29 .
黄凯 . 基于威胁情报的数据分析和自动决策 [C ] // 首届网络安全分析与情报大会 . 2017 .
HUANG K , . Data analysis and automatic decision making based on threat intelligence [C ] // Proceedings of 1st Conference on Cybersecurity Analysis and Intelligence . 2017 .
肖鹏 , 苏永东 , 张睿 , 等 . 电网信息安全威胁情报自动化应用技术研究 [J ] . 网络安全技术与应用 , 2016 ( 12 ).
XIAO P , SU Y D , ZHANG R , et al . Research on application technology of Power grid information security Threat Intelligence automation [J ] . Network Security Technology & Application , 2016 ( 12 ).
张卓 , 陈毓端 , 唐伽佳 , 等 . 基于威胁的网络安全动态防御研究 [J ] . 保密科学技术 , 2020 ( 6 ): 22 - 31 .
ZHANG Z , CHEN Y R , TANG J J , et al . Research on dynamic defense of network security based on threat [J ] . Secrecy Science and Technology , 2020 ( 6 ): 22 - 31 .
薄明霞 , 唐洪玉 , 冯晓冬 . 基于大数据的安全威胁情报分析与共享平台技术架构研究 [J ] . 电信技术 , 2019 ( 11 ).
BO M X , TANG H Y , FENG X D . Research on security threat intelligence analysis and sharing platform technology architecture based on big data [J ] . Telecommunications Technology , 2019 ( 11 ).
刘汉生 , 唐洪玉 , 薄明霞 , 等 . 基于机器学习的多源威胁情报质量评价方法 [J ] . 电信科学 , 2020 , 36 ( 1 ): 119 - 126 .
LIU H S , TANG H Y , BO M X , et al . A multi-source threat intelligence confidence value evaluation method based on machine learning [J ] . Telecommunications Science , 2020 , 36 ( 1 ): 119 - 126 .
0
浏览量
534
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构